Cyber Intelligence Daily -- May 10, 2026
CYBER INTELLIGENCE DAILY BRIEF — 10 MAY 2026
TLP:WHITE | 0600 UTC | Coverage Window: 08–10 May 2026
Bottom Line
Three CISA KEV additions in the past five days — anchored by an actively exploited BerriAI LiteLLM SQL injection — are the operational priority for federal and enterprise defenders. An out-of-band ASP.NET Core Data Protection patch and the unresolved Palo Alto PAN-OS zero-day (CVE-2026-0300, no patch available) define the unpatched attack surface heading into the 12 May Patch Tuesday cycle. The ShinyHunters extortion campaign against Instructure Canvas is live with a 12 May attacker-stated leak deadline.
Key open question: Whether ShinyHunters executes the 12 May Instructure data dump or negotiations extend — the outcome determines whether institutions face an imminent secondary phishing wave keyed to authentic Canvas message content.
Key Judgments
KJ-1. CVE-2026-42208 (BerriAI LiteLLM) is being exploited in the wild to extract AI proxy database contents including virtual API keys and upstream provider credentials. (Moderate confidence — exploitation timing and IOCs sourced to a single vendor research team; see Confidence Note.)
KJ-2. CVE-2026-6973 (Ivanti EPMM) is being exploited as a zero-day against a self-reported "very limited number" of customers per Ivanti's own advisory; CISA has added it to the KEV catalog. (High confidence — CISA KEV primary record; Ivanti vendor advisory. FCEB remediation deadline: consult your agency's CISA BOD 22-01 tracking — the KEV catalog entry currently lists no due date; agencies should apply the standard 14-day BOD 22-01 calculation from the 7 May addition date, yielding 21 May 2026 absent a specific override.)
KJ-3. CVE-2026-0300 (Palo Alto PAN-OS User-ID Authentication Portal, out-of-bounds write) permits unauthenticated code execution on PA-Series and VM-Series firewalls and currently has no vendor patch — only configuration-based mitigation. (High confidence — CISA KEV primary record; Palo Alto Networks advisory. Exploitation telemetry beyond the KEV listing itself has not been independently corroborated in this brief's collection window.)
KJ-4. Microsoft's out-of-band ASP.NET Core Data Protection update requires not only package upgrade but also key-ring rotation; tokens forged during the vulnerable window remain valid after patching alone. (Moderate confidence — sourced to Microsoft vendor guidance; CVE does not appear in the pre-gathered intelligence sweep and is carried forward on the basis of vendor advisory reporting only.)
KJ-5. The ShinyHunters extortion of Instructure Canvas is confirmed by the victim organization, with a 12 May 2026 attacker-stated leak deadline; the attacker-claimed scale of 275 million records across 8,809 institutions is not independently verified. (Moderate confidence — victim CISO disclosure is primary; ShinyHunters attribution is attacker self-claim corroborated by Mandiant TTP pattern-matching, not independent forensic attribution.)
KJ-6. A cluster of five GeoVision physical security CVEs published 4 May 2026 — including CVE-2026-42369 (CVSS 10.0) — remains unpatched with no vendor remediation timeline. (High confidence — NIST NVD primary records; no-patch status confirmed by absence of vendor advisory.)
| Assessment Area | Finding | Confidence |
|---|---|---|
| KEV exploitation status | CVE-2026-42208, -6973, -0300 confirmed exploited | High (KEV primary record) |
| Patch availability | LiteLLM and EPMM patched; PAN-OS mitigation-only | High |
| Instructure breach occurrence | Victim CISO confirmed | High |
| Instructure breach scope | 275M record / 8,809 institution figures are attacker-claimed, not verified | Low |
| ShinyHunters attribution | Attacker self-claim + Mandiant TTP pattern; not forensically attributed | Moderate |
| Attribution (PAN-OS, EPMM) | No public attribution to named actor | Low |
| Ransom outcome (12 May deadline) | Leak vs. payment unknown | Unverified |
CISA added three vulnerabilities to the Known Exploited Vulnerabilities catalog between 6 and 8 May 2026. The BerriAI LiteLLM SQL injection (CVE-2026-42208) was reportedly exploited within hours of disclosure, marking one of the earliest KEV entries targeting dedicated AI gateway infrastructure rather than general-purpose enterprise software (analytical inference — no comparative baseline catalog survey has been conducted in this collection window; treat as preliminary observation pending verification). The Palo Alto PAN-OS zero-day (CVE-2026-0300) has no patch available; only zone-restriction mitigation is offered. Microsoft separately issued an out-of-band ASP.NET Core fix that requires post-patch key rotation to fully remediate. The active ShinyHunters extortion of Instructure Canvas enters its final 48 hours before the attacker's stated 12 May leak deadline.
Story 1 — Three KEV Additions, FCEB Remediation Required [ACTIONABLE]
CVE-2026-42208 — BerriAI LiteLLM SQL Injection (Added 8 May 2026)
CISA added CVE-2026-42208 to the KEV catalog on 8 May 2026. The vulnerability is a pre-authentication SQL injection in BerriAI's LiteLLM AI proxy, affecting versions ≥1.81.16 and <1.83.7, fixed in 1.83.7 per GitHub advisory GHSA-r75f-5x8p-qvmc. The flaw is reachable via a crafted Authorization header to LLM API routes including POST /chat/completions, allowing an unauthenticated attacker to read and modify the proxy database — including virtual API keys, upstream provider credentials, and configuration variables.
FCEB remediation deadline: The KEV catalog entry for CVE-2026-42208 currently lists no specific due date. Federal agencies should apply the standard BOD 22-01 14-day calculation from the 8 May addition date, yielding 22 May 2026 absent a CISA-issued override. Verify against the live KEV catalog entry before operationalizing this date.
Reported exploitation: Sysdig Threat Research Team reported first observed exploitation approximately 36 hours after the advisory entered the GitHub Advisory Database, with attacker source IPs 65.111.27.132 and 65.111.25.67 issuing requests with user agent Python/3.12 aiohttp/3.9.1 targeting LiteLLM key tables. (Single source — Sysdig TRT vendor research blog; timing precision of "36 hours and 7 minutes" and named IPs are unverified against independent telemetry. IOCs should be treated as single-source pending corroboration. No victim count, sector, or geography beyond these two IPs has been published in this collection window.) No named Sysdig researcher has been independently verified by this brief's collection process; the attribution to a researcher named "Michael Clark" appears in reporting but cannot be confirmed against primary Sysdig publication records available to this brief.
Action — Defenders:
- Upgrade LiteLLM to 1.83.7 immediately.
- If immediate upgrade is impossible, set
disable_error_logs: trueundergeneral_settings(vendor-recommended interim mitigation per BerriAI advisory). - Rotate all LiteLLM virtual keys, master keys, and upstream provider credentials regardless of patch status — assume compromise if the proxy was internet-reachable.
- Hunt proxy and web logs for
Authorization: Bearer sk-litellm'patterns andUNION SELECTstrings.
CVE-2026-6973 — Ivanti EPMM Improper Input Validation (Added 7 May 2026)
Ivanti confirmed CVE-2026-6973 was exploited as a zero-day against a "very limited number of customers" per the vendor's own advisory. The vulnerability is an improper input validation flaw in on-premises Ivanti Endpoint Manager Mobile (EPMM) instances. Cloud-based Ivanti Neurons for MDM is not affected.
FCEB remediation deadline: The KEV catalog entry currently lists no specific due date. Applying the standard BOD 22-01 14-day calculation from the 7 May addition date yields 21 May 2026 absent a CISA-issued override. Verify against the live KEV catalog entry.
Shadowserver Foundation reported over 800 internet-exposed Ivanti EPMM instances as of approximately 7 May 2026 (Shadowserver Foundation internet-exposure scan telemetry; specific dashboard URL not available in this collection window — verify at shadowserver.org/statistics). No public attribution has been issued for this campaign. Prior EPMM zero-day campaigns in 2023 and May 2025 (CVE-2025-4427/4428) included activity attributed by Mandiant to Chinese state-sponsored clusters; that attribution must not be transferred to the current campaign without independent evidence — doing so would constitute analytical leap. The claim that prior campaigns reached "dozens of victims" before vendor disclosure is drawn from Mandiant's published retrospective reporting on the 2023 EPMM campaign and is not independently verified for the current incident.
Action — Defenders:
- Upgrade on-premises EPMM to 12.6.1.1, 12.7.0.1, or 12.8.0.1 per Ivanti advisory.
- Audit and rotate all EPMM administrative credentials.
- Review authentication logs for unusual administrative session origins; remove unused admin accounts.
- No reliable atomic IOCs are currently published for this CVE — behavioral hunting on EPMM admin activity is required.
CVE-2026-0300 — Palo Alto PAN-OS Out-of-Bounds Write (Added 6 May 2026; No Patch)
The PAN-OS vulnerability resides in the User-ID Authentication Portal (Captive Portal) service of PA-Series and VM-Series firewalls. An unauthenticated attacker can achieve code execution by sending specially crafted packets. No official patch is currently available. Exploitation telemetry beyond the CISA KEV listing itself — including victim count, actor identity, and observed exploitation volume — has not been independently corroborated in this collection window.
FCEB remediation deadline: The KEV catalog entry currently lists no specific due date. Applying the standard BOD 22-01 14-day calculation from the 6 May addition date yields 20 May 2026 absent a CISA-issued override. Verify against the live KEV catalog entry.
Action — Defenders:
- Restrict User-ID Authentication Portal access to trusted zones only (Palo Alto Networks-recommended workaround per vendor advisory).
- If Captive Portal is not operationally required, disable it pending patch release.
- Monitor for crash dumps or anomalous reboots on perimeter firewalls.
Story 2 — Microsoft Out-of-Band: ASP.NET Core Data Protection [ACTIONABLE]
(Note: The CVE associated with this story does not appear in the pre-gathered intelligence sweep for this brief. This story is carried forward on the basis of vendor advisory reporting only. Readers should verify the advisory directly at the Microsoft Security Response Center before operationalizing.)
A regression in Microsoft.AspNetCore.DataProtection NuGet packages causes the managed authenticated encryptor to compute its HMAC validation tag incorrectly, discarding the computed hash in some cases. The broken validation allows an attacker to forge payloads that pass authenticity checks and to decrypt previously-protected payloads in authentication cookies, antiforgery tokens, TempData, and OIDC state. Per Microsoft vendor guidance, the fix is available in the updated package version.
The critical remediation detail: If an attacker authenticated as a privileged user during the vulnerable window, they may have induced the application to issue legitimately-signed tokens. These tokens remain valid after upgrading the package unless the DataProtection key ring is separately rotated. This guidance is attributed to Microsoft vendor advisory documentation; the named program manager "Rahul Bhandari" appears in reporting on this advisory but cannot be independently verified against primary MSRC publication records available to this brief's collection process.
Action — Defenders:
- Update Microsoft.AspNetCore.DataProtection to the patched version per the MSRC advisory (verify current fixed version at microsoft.com/security).
- Redeploy the application.
- Rotate the DataProtection key ring — patching alone is insufficient.
- Audit privileged session activity from the vulnerable deployment window.
Forward look: References in some reporting to "Bluehammer-family exploits (RedSun, UnDefend)" and a prior "CVE-2026-33825" in connection with the 12 May Patch Tuesday cycle could not be corroborated against any MSRC advisory, named researcher publication, or Tier 1–3 outlet in this collection window. (Unverified — single-source gap-fill research; these named exploit families and CVE are excluded from analytical judgments in this brief and flagged here for transparency only.)
Story 3 — ShinyHunters / Instructure Canvas: 48 Hours to Attacker-Stated Leak Deadline
Instructure confirmed on the company status page that Canvas, Canvas Beta, and Canvas Test were placed in maintenance mode on 7 May 2026. The vendor stated it revoked privileged credentials and access tokens, deployed patches, rotated certain keys, and increased monitoring. Exposed data per the vendor: names, email addresses, student ID numbers, and user messages; the vendor stated at time of disclosure that there was no evidence of passwords, dates of birth, government identifiers, or financial data being involved.
Attacker claims: ShinyHunters claimed the breach and asserted that nearly 9,000 schools worldwide were affected with "billions" of private messages accessed, per Associated Press reporting and WIRED reporting on Canvas portal defacements tied to a 12 May 2026 attacker-stated leak deadline. The 275 million record / 8,809 institution figures originate with the attacker and are not independently verified (contested — Instructure has not confirmed scope; attacker-issued figures in prior ShinyHunters campaigns have historically been inflated, though this pattern does not constitute verification that current figures are inaccurate).
Named sources in reporting: The CISO disclosure appeared on the Instructure status page. Associated Press reporting cited an analyst at Emsisoft characterizing ShinyHunters' claims; WIRED reported on the portal defacements and leak deadline. The specific named individuals attributed to these outlets — "Steve Proud" (Instructure CISO), "Luke Connolly" (Emsisoft), "Heather Hollingsworth" (AP), "Lily Hay Newman and Andy Greenberg" (WIRED) — appear in secondary reporting but cannot be independently verified against primary publication records available to this brief's collection process. (Single-source flag applies to all named-individual attributions in this story.)
Reported initial access vector: Multiple outlets reported that the attacker exploited Instructure's Free-For-Teacher (FFT) program, which permitted educator account creation without institutional verification, as the trust-boundary failure enabling access to institutional tenant data. (Per BleepingComputer and AP reporting; Instructure has not published a full root-cause analysis confirming this vector as of this collection window. Treat as reported, not confirmed.)
Instructure has permanently shut down the FFT program.
Threat actor profile: Mandiant reports activity consistent with prior ShinyHunters-branded extortion operations, characterized by credential-harvesting via fake company-branded login pages followed by data theft from cloud SaaS platforms. ShinyHunters attribution for this specific incident is attacker self-claim corroborated by Mandiant TTP pattern-matching; it is not independent forensic attribution.
Action — Affected institutions:
- Rotate Canvas API credentials and any LTI/integration keys.
- Enforce MFA on all administrative and faculty accounts.
- Brief faculty and students on Canvas-themed phishing — stolen data (names, emails, student IDs, message content) enables highly convincing spear-phishing.
- Sustain elevated phishing-awareness posture for minimum 90 days regardless of 12 May leak outcome — data is already exfiltrated.
Story 4 — GeoVision Physical Security Cluster: Five CVEs, No Patches
Five vulnerabilities published 4 May 2026 affect GeoVision video monitoring and license plate capture hardware. No vendor patches have been released. No public PoC code has been confirmed.
| CVE | CVSS | Product | Class |
|---|---|---|---|
| CVE-2026-42369 | 10.0 | GV-VMS V20 | Stack overflow → unauthenticated RCE via WebCam Server gvapi Authorization header |
| CVE-2026-42364 | 9.9 | GeoVision GV-LPC2011/LPC2211 (firmware 1.10) | OS command injection via DdnsSetting.cgi |
| CVE-2026-42368 | 9.9 | GeoVision GV-LPC2011/LPC2211 | Privilege escalation via web interface |
| CVE-2026-7161 | 9.3 | GV-IP Device Utility | Insufficient encryption in device authentication |
| CVE-2026-42370 / CVE-2026-7372 | 9.0 | GV-VMS V20 | WebCam Server Login stack overflow |
CVSS scores above are drawn from NIST NVD primary records published 4 May 2026. The KEV input data for CVE-2026-0300 shows "CVSS N/A" in the catalog entry; CVSS scores for the GeoVision cluster are sourced from NVD, not the KEV catalog, and should be verified at nvd.nist.gov before operationalizing.
(Note: A claim that the GeoVision WebCam Server binary is compiled without ASLR appeared in the draft of this brief but could not be attributed to any named researcher, advisory, or published binary analysis in this collection window. That claim is excluded here pending sourced corroboration.)
Action — Defenders:
- Treat all listed GeoVision devices as untrusted and isolate from internet-facing networks immediately.
- Disable WebCam Server on GV-VMS where not operationally required.
- Restrict device management to dedicated VLANs with no internet path.
- Monitor for new vendor advisories — no patch ETA has been published.
Alternative Hypotheses
Alternative 1: The Ivanti EPMM exploitation is broader than "very limited." Ivanti's characterization is vendor self-reporting with an inherent incentive to minimize disclosed scope. Shadowserver's 800+ exposed-instance figure and the pattern of prior EPMM zero-day campaigns reaching significant victim counts before vendor disclosure suggest current scope may be undercounted. Assessment: Plausible but unverified. Accepting this alternative would not change KJ-2 (exploitation status confirmed) but would elevate operational urgency for all EPMM operators, not only those with confirmed indicators. Confidence impact on KJ-2: None on exploitation status; would shift urgency framing from "limited" to "broad."
Alternative 2: ShinyHunters' Instructure figures are accurate. The 275M / 8,809 figures are large but consistent with Canvas's published install base. Assessment: Possible. The figures remain attacker-sourced and Instructure has not confirmed them; treating them as verified would be premature. Confidence impact: Would move KJ-5 scope assessment from Low to Moderate if Instructure or an independent forensic firm corroborates.
Alternative 3: The LiteLLM exploitation activity is researcher scanning, not weaponization. The two source IPs and Python/aiohttp user agent are consistent with automated security research or bug-bounty scanning, not necessarily malicious credential extraction. The single-source nature of the Sysdig report means no independent telemetry has confirmed that the observed requests successfully exfiltrated data. Assessment: Plausible. If this alternative is correct, KJ-1 confidence would drop from Moderate to Low and the "active exploitation" characterization would require revision. Confidence impact: Would materially weaken KJ-1 if corroborated.
Alternative 4: CVE-2026-0300 exploitation is already commodified, not targeted. The KEV listing confirms exploitation but provides no actor characterization. Given the absence of a patch and the high value of perimeter firewall compromise, the vulnerability may already be in use by multiple actors across criminal and state-sponsored clusters rather than a single targeted campaign. Assessment: Plausible and consistent with the absence of any published attribution. Confidence impact: Would not change KJ-3 but would elevate urgency of the mitigation recommendation from "targeted threat" to "broad opportunistic threat."
Policy Implications
-
For CISA / FCEB CISOs: The LiteLLM entry signals that KEV scope is expanding into AI infrastructure faster than agency asset inventories track AI gateways — many agencies do not yet enumerate LiteLLM, vector databases, or model proxies as patchable assets. Asset-inventory schemas require update before the next AI-pipeline KEV addition. FCEB remediation deadlines for all three current KEV entries should be calculated from the BOD 22-01 14-day standard against each addition date, as the catalog entries currently list no specific due dates.
-
For enterprise CISOs running on-premises Ivanti EPMM: Patch immediately; rotate admin credentials regardless of patch status. Repeated zero-day exploitation of EPMM since 2023 indicates the product's attack surface is structurally exposed — risk-tolerance decisions about migration to Ivanti Neurons (cloud, unaffected) or alternative MDM platforms are no longer deferrable.
-
For US Department of Education and state education agencies: Approximately 9,000 institutions may face a 12 May data dump per attacker claims (unverified). The Free-For-Teacher trust-boundary failure, if confirmed as the root cause, represents a one-way architectural ratchet — once educator accounts shared infrastructure with institutional tenants, isolation could not be retroactively imposed without architectural rebuild. Sector-wide multi-tenant SaaS isolation guidance is needed.
-
For network operators using Palo Alto PA-Series / VM-Series with Captive Portal: No patch is available for CVE-2026-0300. Zone-restriction mitigation depends on operators having segmentation maturity to identify and enforce "trusted zones" — many deployments lack this maturity, leaving them effectively unmitigated until patch release. Vendors face no current regulatory liability for shipping mitigation-only guidance in lieu of patches; operators bear the full residual risk during the unpatched window.
-
For physical security integrators: GeoVision devices in the named cluster should be considered indefinitely unpatched. IP camera and surveillance device vendors operate on patch cycles measured in quarters or years; defenders cannot treat vendor remediation as a primary control for these device classes.
Intelligence Gaps and Collection Requirements
PIR-1. Identity and attribution of the threat actor exploiting CVE-2026-6973 against Ivanti EPMM — given that 2023 and 2025 EPMM zero-days were attributed to Chinese state-sponsored activity by Mandiant, is the current campaign continuity of that actor, opportunistic criminal exploitation, or a new cluster? Collection method: Mandiant/CrowdStrike incident response engagement reporting; CISA joint advisory if attribution is established.
PIR-2. Actual scope of the Instructure Canvas compromise — is the attacker's 275M record / 8,809 institution claim accurate, inflated, or understated? Collection method: OSINT monitoring of ShinyHunters leak site post-12 May; forensic findings from Instructure's engaged investigators if published.
PIR-3. Whether public PoC code for any of the five GeoVision CVEs has been published to non-public exploit markets or restricted forums. Collection method: OSINT monitoring of exploit broker channels; Recorded Future / Flashpoint underground reporting.
PIR-4. Whether CVE-2026-0300 PAN-OS exploitation is being conducted by a single actor or has been commodified — the absence of a patch increases incentive for commodification. Collection method: GreyNoise mass-scan telemetry; honeypot deployment behind PAN-OS captive portals.
PIR-5. Independent corroboration of the LiteLLM exploitation IOCs (65.111.27.132, 65.111.25.67) and confirmation that observed requests resulted in successful data exfiltration rather than scanning activity. Collection method: GreyNoise and Shodan telemetry; additional vendor research team reporting; victim self-disclosure.
PIR-6. Verification of FCEB-specific remediation deadlines for CVE-2026-42208, CVE-2026-6973, and CVE-2026-0300 — all three KEV entries currently list no due date in the catalog. Collection method: Direct query of live CISA KEV catalog at cisa.gov/known-exploited-vulnerabilities-catalog; CISA emergency directive issuance monitoring.
What to Watch
- If ShinyHunters releases the Instructure data on 12 May → expect a sector-wide spear-phishing wave keyed to authentic Canvas message content within 7–14 days; institutional incident response posture should be pre-positioned now.
- If Palo Alto Networks ships an emergency patch for CVE-2026-0300 before 13 May → the accelerated timeline would indicate exploitation volume is exceeding the vendor's planned regular-cadence release tolerance, suggesting broader active exploitation than currently characterized.
- If a public PoC appears for CVE-2026-6973 → expect rapid commodification of the EPMM exploit and a shift from "very limited" to broad opportunistic scanning within 72 hours.
- If CERT-UA issues a UAC-XXXX advisory naming CVE-2026-0300 as a Russian state-sponsored exploitation vector → the PAN-OS zero-day has transitioned from unknown-actor to state-aligned use, with NATO defender implications requiring immediate escalation.
- If independent telemetry (GreyNoise, Shodan, a second vendor research team) corroborates the LiteLLM exploitation IOCs → KJ-1 confidence upgrades from Moderate to High and the "active exploitation" characterization is confirmed.
- If CISA publishes specific BOD 22-01 due dates for the three current KEV entries → the remediation deadlines in this brief's BOD 22-01 calculations should be superseded by the catalog-listed dates immediately.
Named Actors
Researchers and incident responders (all named-individual attributions below appear in secondary reporting and cannot be independently verified against primary publication records available to this brief's collection process — single-source flag applies):
- Sysdig Threat Research Team — first-observed-exploitation reporting on CVE-2026-42208 timing and attacker IOCs. A researcher named "Michael Clark" is attributed to this work in reporting; unverified against primary Sysdig publication.
- An Emsisoft analyst — cited by Associated Press characterizing ShinyHunters' Instructure claims. Named in reporting as "Luke Connolly"; unverified against primary Emsisoft publication.
- WIRED reporters — reporting on Canvas portal defacements and 12 May leak deadline. Named in reporting as "Lily Hay Newman and Andy Greenberg"; unverified against primary WIRED bylines.
- Associated Press reporter — primary AP byline on Instructure breach. Named in reporting as "Heather Hollingsworth"; unverified against primary AP byline.
Vendor / victim officials (same single-source caveat applies):
- Instructure CISO — published incident disclosure on Instructure status page. Named in reporting as "Steve Proud"; unverified against primary Instructure publication.
- Microsoft program manager — public guidance on ASP.NET Core Data Protection regression and required key-ring rotation. Named in reporting as "Rahul Bhandari"; unverified against primary MSRC publication.
Organizations (verified against primary-tier sources):
- CISA — Known Exploited Vulnerabilities catalog (primary Tier 1 source).
- Ivanti — CVE-2026-6973 vendor advisory (primary Tier 1 source).
- BerriAI — LiteLLM GitHub advisory GHSA-r75f-5x8p-qvmc (primary Tier 1 source).
- Palo Alto Networks — PAN-OS advisory for CVE-2026-0300 (primary Tier 1 source).
- Shadowserver Foundation — internet-exposure scan telemetry on EPMM (Tier 2 source; specific dashboard citation not available in this collection window).
- Mandiant — ShinyHunters TTP characterization and prior EPMM attribution (Tier 2 source).
- Sysdig Threat Research Team — LiteLLM exploitation reporting (Tier 2 source; single-source for exploitation claims).
Threat actors:
- ShinyHunters — extortion group; self-claimed responsibility for Instructure Canvas breach. Attribution is attacker self-claim corroborated by Mandiant TTP pattern-matching; not independently forensically attributed.
References
-
Cybersecurity and Infrastructure Security Agency. (n.d.). Known exploited vulnerabilities catalog. Retrieved from https://www.cisa.gov/known-exploited-vulnerabilities-catalog
-
National Institute of Standards and Technology, National Vulnerability Database. (n.d.). CVE-2026-42208 detail. Retrieved from https://nvd.nist.gov/vuln/detail/[CVE-2026-42208](https://blacklensintelligence.com/cve-2026-42208/)
-
BerriAI. (n.d.). LiteLLM security advisory GHSA-r75f-5x8p-qvmc. Retrieved from https://github.com/BerriAI/litellm/security/advisories/GHSA-r75f-5x8p-qvmc
-
Sysdig Threat Research Team. (n.d.). Sysdig blog. Retrieved from https://www.sysdig.com/blog/
-
Ivanti. (n.d.). Security advisory: Ivanti Endpoint Manager Mobile (EPMM) — May 2026. Retrieved from https://www.ivanti.com/security-advisories
-
Palo Alto Networks. (n.d.). Security advisory for CVE-2026-0300, PAN-OS User-ID authentication portal. Retrieved from https://security.paloaltonetworks.com/
-
Microsoft Security Response Center. (n.d.). Vendor guidance on ASP.NET Core Data Protection regression and key-ring rotation requirement. Retrieved from https://msrc.microsoft.com/
-
Instructure, Inc. (n.d.). Status page incident disclosure, 7–8 May 2026. Retrieved from https://status.instructure.com/
-
Associated Press. (n.d.). Reporting on Instructure Canvas breach citing Emsisoft analyst. Retrieved from https://apnews.com/
-
WIRED. (n.d.). Reporting on ShinyHunters extortion of Canvas portals and 12 May 2026 leak deadline. Retrieved from https://www.wired.com/
-
Shadowserver Foundation. (n.d.). Internet-exposure scan data for Ivanti EPMM. Retrieved from https://www.shadowserver.org/
-
National Institute of Standards and Technology, National Vulnerability Database. (2026). CVE-2026-42369 detail. Retrieved from https://nvd.nist.gov/vuln/detail/[CVE-2026-42369](https://blacklensintelligence.com/cve-2026-42369-2/)
-
National Institute of Standards and Technology, National Vulnerability Database. (n.d.). CVE-2026-42364 detail. Retrieved from https://nvd.nist.gov/vuln/detail/[CVE-2026-42364](https://blacklensintelligence.com/cve-2026-42364-2/)
-
National Institute of Standards and Technology, National Vulnerability Database. (n.d.). CVE-2026-42368 detail. Retrieved from https://nvd.nist.gov/vuln/detail/[CVE-2026-42368](https://blacklensintelligence.com/cve-2026-42368-2/)
-
National Institute of Standards and Technology, National Vulnerability Database. (n.d.). CVE-2026-7161 detail. Retrieved from https://nvd.nist.gov/vuln/detail/[CVE-2026-7161](https://blacklensintelligence.com/cve-2026-7161-2/)
-
National Institute of Standards and Technology, National Vulnerability Database. (n.d.). CVE-2026-42370 detail; CVE-2026-7372 detail. Retrieved from https://nvd.nist.gov/vuln/detail/[CVE-2026-42370](https://blacklensintelligence.com/cve-2026-42370-3/) | https://nvd.nist.gov/vuln/detail/[CVE-2026-7372](https://blacklensintelligence.com/cve-2026-7372-3/)
-
BleepingComputer. (n.d.). Reporting on CVE-2026-42208 KEV addition and exploitation. Retrieved from https://www.bleepingcomputer.com/
-
Google Cloud, Mandiant. (n.d.). Threat-actor characterization of ShinyHunters extortion operations and prior EPMM campaign attribution. Retrieved from https://cloud.google.com/blog/topics/threat-intelligence
Confidence Note
High confidence:
- CVE-2026-42208, CVE-2026-6973, and CVE-2026-0300 were added to the CISA KEV catalog on the dates stated and are confirmed exploited. Source: CISA KEV catalog primary entries (Tier 1).
- The Instructure breach occurred and was confirmed by the victim organization. Source: Instructure status page primary disclosure (Tier 1 victim disclosure).
- GeoVision CVE severities and unpatched status. Source: NIST NVD primary records (Tier 1).
- Microsoft ASP.NET Core Data Protection requires key-ring rotation in addition to package upgrade. Source: Microsoft vendor advisory (Tier 1); note that the associated CVE does not appear in the pre-gathered intelligence sweep and the advisory URL is not confirmed in this collection window.
Moderate confidence:
- LiteLLM exploitation is active and malicious rather than researcher scanning (KJ-1). Source: Sysdig TRT vendor research (Tier 2, single source). Confidence is Moderate, not High, because no independent telemetry corroborates the Sysdig report and the alternative hypothesis that observed activity is security research scanning has not been ruled out.
- ShinyHunters attribution for the Instructure breach. Source: Attacker self-claim corroborated by Mandiant TTP pattern-matching (Tier 2); not independent forensic attribution.
- The 12 May 2026 leak deadline is real and operational. Source: Multiple-outlet reporting; attacker-stated.
- Initial access via Instructure's Free-For-Teacher program. Source: Multiple-outlet reporting; Instructure has not published a confirmed root-cause analysis.
Low confidence / unverified:
- The 275 million record / 8,809 institution scope figures for the Instructure breach. Source: Attacker-claimed only; not vendor-confirmed.
- Attribution of CVE-2026-6973 exploitation to any named threat actor. Source: None — Ivanti has not attributed; prior EPMM zero-days were Chinese-state-attributed by Mandiant but transfer of attribution to the current campaign is not warranted without independent evidence.
- Exploitation telemetry for CVE-2026-0300 beyond the KEV listing itself. Source: No independent victim count, actor identity, or exploitation volume has been published in this collection window.
Excluded from this brief (unverified — single-source gap-fill research without primary-source confirmation):
- "CERT-UA UAC-0271" advisory — surfaced only in gap-fill research; not corroborated at cert.gov.ua.
- "LockBit AP-HP" breach — surfaced only in gap-fill research; not corroborated at ANSSI or any Tier 1–3 outlet.
- "Bluehammer-family exploits (RedSun, UnDefend)" and "CVE-2026-33825" — surfaced only in gap-fill research; not corroborated against any MSRC advisory or named researcher publication.
- ASLR-absence claim for GeoVision WebCam Server — no named researcher, advisory, or binary analysis available in this collection window.
- FCEB-specific remediation due dates — the KEV catalog entries for all three current additions list "due None"; dates calculated in this brief use the BOD 22-01 14-day standard and must be superseded by any CISA-published specific dates.
Key unresolved gaps that would shift confidence levels:
- Independent telemetry corroborating LiteLLM exploitation IOCs would shift KJ-1 from Moderate to High.
- Instructure or independent forensic confirmation of the 275M / 8,809 scope figures would shift KJ-5 scope assessment from Low to Moderate.
- Attribution for CVE-2026-6973 exploitation would determine whether on-premises EPMM is subject to a state-sponsored or criminal campaign — materially changes incident-response posture for affected agencies.
- Palo Alto Networks patch release for CVE-2026-0300 — every additional day without patch increases commodification risk and the plausibility of Alternative Hypothesis 4.